Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 01:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7e850cd564274901577d6fea85c03062.exe
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7e850cd564274901577d6fea85c03062.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
7e850cd564274901577d6fea85c03062.exe
-
Size
1.0MB
-
MD5
7e850cd564274901577d6fea85c03062
-
SHA1
99c902f48836ed33f36ca8fd41118b6f6834b335
-
SHA256
52e337707020474fa67108cdea16a0fca26aa60f2add3618506ceb6ab73a9464
-
SHA512
006bbd4c73bac85f8676b98c4610bae2845ef57c92810c77c978bfc9a4611efbb1cdd6717d083510886283975d38e3bf388450280a0aaa59922a18fab2168db8
-
SSDEEP
12288:Egfm7zPkiDWPFd25sZgFUt2ANAu3yx+XQsiE9SULxIe4Hnlq2PyHsvAYhWWHqaP6:x+/kzayPQANa+XQsiE5IlsHsvA/Wy
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 412 wrote to memory of 1948 412 7e850cd564274901577d6fea85c03062.exe 85 PID 412 wrote to memory of 1948 412 7e850cd564274901577d6fea85c03062.exe 85 PID 412 wrote to memory of 1948 412 7e850cd564274901577d6fea85c03062.exe 85 PID 1948 wrote to memory of 2540 1948 7e850cd564274901577d6fea85c03062.exe 86 PID 1948 wrote to memory of 2540 1948 7e850cd564274901577d6fea85c03062.exe 86 PID 1948 wrote to memory of 2540 1948 7e850cd564274901577d6fea85c03062.exe 86 PID 2540 wrote to memory of 4556 2540 7e850cd564274901577d6fea85c03062.exe 87 PID 2540 wrote to memory of 4556 2540 7e850cd564274901577d6fea85c03062.exe 87 PID 2540 wrote to memory of 4556 2540 7e850cd564274901577d6fea85c03062.exe 87 PID 4556 wrote to memory of 1128 4556 7e850cd564274901577d6fea85c03062.exe 88 PID 4556 wrote to memory of 1128 4556 7e850cd564274901577d6fea85c03062.exe 88 PID 4556 wrote to memory of 1128 4556 7e850cd564274901577d6fea85c03062.exe 88 PID 1128 wrote to memory of 2756 1128 7e850cd564274901577d6fea85c03062.exe 89 PID 1128 wrote to memory of 2756 1128 7e850cd564274901577d6fea85c03062.exe 89 PID 1128 wrote to memory of 2756 1128 7e850cd564274901577d6fea85c03062.exe 89 PID 2756 wrote to memory of 4576 2756 7e850cd564274901577d6fea85c03062.exe 90 PID 2756 wrote to memory of 4576 2756 7e850cd564274901577d6fea85c03062.exe 90 PID 2756 wrote to memory of 4576 2756 7e850cd564274901577d6fea85c03062.exe 90 PID 4576 wrote to memory of 1088 4576 7e850cd564274901577d6fea85c03062.exe 91 PID 4576 wrote to memory of 1088 4576 7e850cd564274901577d6fea85c03062.exe 91 PID 4576 wrote to memory of 1088 4576 7e850cd564274901577d6fea85c03062.exe 91 PID 1088 wrote to memory of 1308 1088 7e850cd564274901577d6fea85c03062.exe 92 PID 1088 wrote to memory of 1308 1088 7e850cd564274901577d6fea85c03062.exe 92 PID 1088 wrote to memory of 1308 1088 7e850cd564274901577d6fea85c03062.exe 92 PID 1308 wrote to memory of 3324 1308 7e850cd564274901577d6fea85c03062.exe 93 PID 1308 wrote to memory of 3324 1308 7e850cd564274901577d6fea85c03062.exe 93 PID 1308 wrote to memory of 3324 1308 7e850cd564274901577d6fea85c03062.exe 93 PID 3324 wrote to memory of 3992 3324 7e850cd564274901577d6fea85c03062.exe 94 PID 3324 wrote to memory of 3992 3324 7e850cd564274901577d6fea85c03062.exe 94 PID 3324 wrote to memory of 3992 3324 7e850cd564274901577d6fea85c03062.exe 94 PID 3992 wrote to memory of 1200 3992 7e850cd564274901577d6fea85c03062.exe 95 PID 3992 wrote to memory of 1200 3992 7e850cd564274901577d6fea85c03062.exe 95 PID 3992 wrote to memory of 1200 3992 7e850cd564274901577d6fea85c03062.exe 95 PID 1200 wrote to memory of 4524 1200 7e850cd564274901577d6fea85c03062.exe 96 PID 1200 wrote to memory of 4524 1200 7e850cd564274901577d6fea85c03062.exe 96 PID 1200 wrote to memory of 4524 1200 7e850cd564274901577d6fea85c03062.exe 96 PID 4524 wrote to memory of 3736 4524 7e850cd564274901577d6fea85c03062.exe 97 PID 4524 wrote to memory of 3736 4524 7e850cd564274901577d6fea85c03062.exe 97 PID 4524 wrote to memory of 3736 4524 7e850cd564274901577d6fea85c03062.exe 97 PID 3736 wrote to memory of 236 3736 7e850cd564274901577d6fea85c03062.exe 98 PID 3736 wrote to memory of 236 3736 7e850cd564274901577d6fea85c03062.exe 98 PID 3736 wrote to memory of 236 3736 7e850cd564274901577d6fea85c03062.exe 98 PID 236 wrote to memory of 248 236 7e850cd564274901577d6fea85c03062.exe 99 PID 236 wrote to memory of 248 236 7e850cd564274901577d6fea85c03062.exe 99 PID 236 wrote to memory of 248 236 7e850cd564274901577d6fea85c03062.exe 99 PID 248 wrote to memory of 2356 248 7e850cd564274901577d6fea85c03062.exe 100 PID 248 wrote to memory of 2356 248 7e850cd564274901577d6fea85c03062.exe 100 PID 248 wrote to memory of 2356 248 7e850cd564274901577d6fea85c03062.exe 100 PID 2356 wrote to memory of 4164 2356 7e850cd564274901577d6fea85c03062.exe 101 PID 2356 wrote to memory of 4164 2356 7e850cd564274901577d6fea85c03062.exe 101 PID 2356 wrote to memory of 4164 2356 7e850cd564274901577d6fea85c03062.exe 101 PID 4164 wrote to memory of 4420 4164 7e850cd564274901577d6fea85c03062.exe 102 PID 4164 wrote to memory of 4420 4164 7e850cd564274901577d6fea85c03062.exe 102 PID 4164 wrote to memory of 4420 4164 7e850cd564274901577d6fea85c03062.exe 102 PID 4420 wrote to memory of 1732 4420 7e850cd564274901577d6fea85c03062.exe 103 PID 4420 wrote to memory of 1732 4420 7e850cd564274901577d6fea85c03062.exe 103 PID 4420 wrote to memory of 1732 4420 7e850cd564274901577d6fea85c03062.exe 103 PID 1732 wrote to memory of 4252 1732 7e850cd564274901577d6fea85c03062.exe 104 PID 1732 wrote to memory of 4252 1732 7e850cd564274901577d6fea85c03062.exe 104 PID 1732 wrote to memory of 4252 1732 7e850cd564274901577d6fea85c03062.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exe"C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe6⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe7⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe8⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe9⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe10⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe11⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe12⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe13⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe14⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe15⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe16⤵
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe17⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe18⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe19⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe20⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\7e850cd564274901577d6fea85c03062.exeC:\Users\Admin\AppData\Local\Temp\\7e850cd564274901577d6fea85c03062.exe21⤵PID:4252
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-